Filters
Question type

Study Flashcards

Employers are prohibited from taking actions against employees or applicants based on their social network postings.

Correct Answer

verifed

verified

Employees of Bodega Inc. maintain a password-protected social media page to "vent about work." Bodega learns of the page and intimidates the network that operates it into revealing the password. After reviewing the posts, Bodega fires the participants. Most likely, this is


A) a violation of the Stored Communications Act.
B) within the employer's rights.
C) a subject for dispute resolution by the network.
D) a "business-extension exception" under the Electronic Communications Privacy Act.

Correct Answer

verifed

verified

Broadband Inc., an Internet service provider, supplies information to the Federal Trade Commission concerning possible unfair or deceptive ads originating in a foreign jurisdiction. Under federal law, Broadband is


A) immune from liability.
B) subject to liability if the information is false.
C) subject to liability if the ads were sent through Broadband's service.
D) subject to liability in the foreign jurisdiction, but not in the United States.

Correct Answer

verifed

verified

State law may protect individuals from having to disclose their social media passwords to potential employers.

Correct Answer

verifed

verified

No court has held that it is legally acceptable for law enforcement to set up a phony social media account to catch a suspect.

Correct Answer

verifed

verified

Outsourcing Inc. registers a domain name that is the same as the trademark of Resourcing LLC and offers to sell the name to the mark's owner. This is


A) cybersquatting.
B) typosquatting.
C) trademark infringement.
D) trademark dilution.

Correct Answer

verifed

verified

A

Cybersquatting occurs when the owner of a trademark registers the mark as a domain name but does not use it for that purpose.

Correct Answer

verifed

verified

Under the Communications Decency Act, Internet service providers are liable as publishers of defamatory statements that come from a third party.

Correct Answer

verifed

verified

Skye posts excerpts from comics and graphic novels on social networking sites without the permission of the owners of the copyrights to the illustrations and stories. This is


A) copyright infringement.
B) a license.
C) goodwill.
D) "fair use."

Correct Answer

verifed

verified

Under the federal law protecting trademarks, "bad faith intent" is one element of a claim of illegal cybersquatting.

Correct Answer

verifed

verified

Afford Motors LLC, an auto broker, uses the trademark of Ford Motor Corporation in a meta tag without Ford's permission. This is


A) cybersquatting.
B) a legitimate business practice.
C) trademark infringement.
D) trademark dilution.

Correct Answer

verifed

verified

InfoFree Inc. makes and sells devices and services for the circumvention of encryption software. Under the Digital Millennium Copyright Act, this is


A) a violation of copyright law.
B) prohibited but not a violation of copyright law.
C) a "fair use" exception to the provisions of the act.
D) permitted for reconsideration every three years.

Correct Answer

verifed

verified

A

Cybersquatting is legal when the person offering for sale a domain name that is the same as another's trademark intends to profit from the sale.

Correct Answer

verifed

verified

Jade transfers selected musical recordings, without the copyright owners' authorization, through her phone to her friends. Jade does not charge her friends for this "service." This is


A) copyright infringement.
B) a license.
C) goodwill.
D) "fair use."

Correct Answer

verifed

verified

Many states require the sender of an e-mail ad to tell recipients how to opt out of receiving future e-mail ads from the sender.

Correct Answer

verifed

verified

True

Federal law permits the sending of unsolicited commercial e-mail to randomly generated e-mail addresses.

Correct Answer

verifed

verified

Because of the loss of significant amounts of revenue as a result of unauthorized digital downloads, file-sharing has created problems for


A) the motion picture industry.
B) recording artists and their labels.
C) the companies that distribute file-sharing software.
D) all of the choices.

Correct Answer

verifed

verified

Any party who gives information to the Federal Trade Commission concerning possible deceptive conduct in a foreign jurisdiction is immune from liability.

Correct Answer

verifed

verified

Downloading music into a computer's random access memory, or RAM, without authorization is copyright infringement.

Correct Answer

verifed

verified

To test computer security and conduct encryption research, Solutions Inc. circumvents the encryption software and other antipiracy protection of Tech Corporation's software. Under the Digital Millennium Copyright Act, this is


A) a violation of copyright law.
B) prohibited but not a violation of copyright law.
C) a "fair use" exception to the provisions of the act.
D) permitted for reconsideration every three years.

Correct Answer

verifed

verified

Showing 1 - 20 of 72

Related Exams

Show Answer